Compliance ApplicationsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Compliance Applications returned the following results.
RSS What is RSS?
Related Categories

 •   Application Security
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Virtualization
 •   Business Process Management (BPM)
 •   Security Policies
 •   Network Security
 •   Endpoint Security
 •   Managed Security Services
 •   Wireless Security

Related Searches
 •   Compliance Applications Code
 •   Compliance Applications Managers
 •   Compliance Applications Storage
 •   Conversion Compliance
 •   Distribution Compliance
 •   Filing Compliance Applications
 •   Flow Compliance Applications
 •   Software Compliance Applications
 •   Technology Compliance
 •   Work Compliance Applications
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Harnessing Oracle Governance, Risk, and Compliance Applications to Improve Your PeopleSoft 9.1 Upgrade by Oracle Corporation

July 01, 2010 - (Free Research)
This paper explains how the Oracle Governance, Risk, and Compliance (GRC) applications suite may be leveraged to streamline your upgrade to PeopleSoft 9.1, while building an enterprise GRC platform that helps realize operating efficiencies, transparency, and sustainable compliance and risk management well into the future. 
(WHITE PAPER) READ ABSTRACT |

Harnessing Oracle Governance, Risk, and Compliance Applications to Improve Your E-Business Suite 12.1 Upgrade by Oracle Corporation

July 01, 2010 - (Free Research)
This video white paper explains how continued use of the Oracle GRC applications suite embeds deep-seated controls within EBS Release 12.1 so business processes are kept intact and optimized long after the upgrade project is complete.  
(WHITE PAPER) READ ABSTRACT |

Building Compliance and Security into an Application Delivery Framework by Citrix

April 2008 - (Free Research)
The right IT solution, such as Citrix Delivery Center™, offers a holistic approach to delivering compliance and security. 
(WHITE PAPER) READ ABSTRACT |

Oracle Fusion Governance, Risk, and Compliance: The New Standard for Risk Management and Compliance by Oracle Corporation

May 2011 - (Free Research)
When organizations fail to comply with regulations, they can face costly fines. It is no surprise, then, that organizations rank achieving compliance as a top priority in order to avoid the overwhelming cost of noncompliance. Learn about an approach that helps effectively manage compliance activities. 
(WHITE PAPER) READ ABSTRACT |

Take Back Control: Increase Security, Empower Employees, Protect the Business by WatchGuard Technologies, Inc.

October 2010 - (Free Research)
Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more. 
(WHITE PAPER) READ ABSTRACT |

Web Application Security Trends Report Q3-Q4, 2008 by Cenzic

May 2009 - (Free Research)
Read this white paper to learn how to protect web applications through application security assessment and penetration testing managed services (SaaS) that identify vulnerabilities and allow organizations to stay ahead of hackers. 
(WHITE PAPER) READ ABSTRACT |

The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success by Breach Security

June 2009 - (Free Research)
This resource provides IT security professionals with the information needed to understand PCI compliance and specifically, one of the standard's latest requirements, 6.6. In addition, the paper offer tips for successful PCI 6.6 compliance and highlights compliance successes from real-world companies. 
(WHITE PAPER) READ ABSTRACT |

Five Pitfalls of Application Package Selection by Sage North America

October 2010 - (Free Research)
This paper presents some pitfalls that should be avoided in order to help you select this application package. If you avoid these pitfalls, you will obtain a package that will work for you for many years to come. Continue reading to learn more about the five pitfalls of application package selection. 
(WHITE PAPER) READ ABSTRACT |

Trust in Your Cloud by VMware, Inc.

September 2011 - (Free Research)
Cloud computing is a new model for IT services leveraging the efficient pooling of an on-demand, self managed virtual infrastructure consumed as a service. Working in concert with the security partner ecosystem, VMware is helping businesses of all sizes migrate to secure cloud computing. 
(VIDEO) READ ABSTRACT |

Six Steps to Application Retirement by Informatica

June 2010 - (Free Research)
How do you retire a legacy application and the supporting software and hardware stack, while keeping the data accessible for reporting, compliance, and regular business needs? In this webinar, you will learn the six steps to safely retire legacy applications using Informatica’s cost-effective information lifecycle management solution. 
(WEBCAST) READ ABSTRACT |

Best Practices for Provisioning Databases for Test and Development by Informatica

January 2009 - (Free Research)
Best practices and new technologies available for provisioning databases for test and development environments are outlined in this white paper. Using this as a guide, organizations can save time and resources, meet regulatory compliance standards, and streamline database provisioning processes for test and development environments. 
(WHITE PAPER) READ ABSTRACT |

Securing the enterprise application layer: Expert Guidelines by IBM

August 2011 - (Free Research)
If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation.  Find out how securing a naming and directory service will help build a solid platform that application can trust. 
(EGUIDE) READ ABSTRACT |

SharePoint E-zine -- February 2011: SharePoint Governance and e-Discovery by SearchWinIT

February 2011 - (Free Research)
Information in SharePoint is subject to the same rules and regulations as other corporate data. Learn what you need to do to prepare for any e-discovery request. Also in this issue, choose third-party tools to help manage a multi-server SharePoint farm, and get expert advice on making SharePoint more secure. 
(EZINE)

Best Practices for Cloud Security by Qualys

January 2012 - (Free Research)
In this essential white paper, discover the benefits that your organization can realize by embracing cloud services, including more effective and cost-efficient security. Also inside, discover cloud cautions and pitfalls to avoid – read on now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Why choose Symantec for Mobile Device Management by Symantec Corporation

June 2012 - (Free Research)
In this white paper, learn some of the most important considerations for deploying a mobile device management solution. Additionally, discover key tips for building a successful framework for planning your mobile security strategy. 
(WHITE PAPER) READ ABSTRACT |

SMB Online Backup Checklist by VaultLogix (E-mail this company)

July 2012 - (Free Research)
This white paper walks you through building an online backup checklist. Learn how to match a solution to your needs and uncover key considerations to include in your backup strategy, and see if cloud storage is a viable option for your business' data backup requirements. 
(WHITE PAPER) READ ABSTRACT |

Secure by Design Protection for Application and Desktop Virtualization by Citrix

May 2014 - (Free Research)
This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them. 
(WHITE PAPER) READ ABSTRACT |

Swiss Nuclear Power Plant Improves Business Continuity by VCE (E-mail this company)

October 2013 - (Free Research)
This whitepaper will help you learn how a major power company achieved a more resilient data center architecture. 
(WHITE PAPER) READ ABSTRACT |

3 Compelling Reasons to Consider Desktop Virtualization by VMware, Inc.

March 2014 - (Free Research)
Check out this informative resource to discover how VDI can help your organization provide access to corporate data and applications from any device, without sacrificing IT control. 
(WHITE PAPER) READ ABSTRACT |

Get Maximum Value from Software with Application Usage Management by Flexera Software

February 2013 - (Free Research)
Software licensing accounts for as much as 35% of IT spend, so it's no surprise that companies are looking to get the highest return on that investment. To effectively manage software spend, you can leverage application usage management, a centralized approach to maximize value and optimize usage across the lifecycle. 
(WHITE PAPER) READ ABSTRACT |

The Tipping Point: Top Unified Communications Issues for 2012 by Sprint

May 2012 - (Free Research)
This expert E-Guide from SearchUnifiedCommunications.com discusses the top five unified communications issues for 2012 and how these will affect the transformation and evolution of UC for the better. 
(EGUIDE) READ ABSTRACT |

The Tipping Point: Top Unified Communications Issues for 2012 by SearchSecurity.com

December 2012 - (Free Research)
This expert E-Guide from SearchUnifiedCommunications.com explores the top five unified communications issues organizations today are facing and how they will affect the transformation and evolution of UC for the better. 
(EGUIDE) READ ABSTRACT |

Best Practices for Oracle Licence Management by Flexera Software

November 2011 - (Free Research)
In this white paper you will learn five reasons why your Oracle licensing requirements may evolve, the five best practices for Oracle license management and more. 
(WHITE PAPER) READ ABSTRACT |

BYOD: Bring Your Own Device – or Bring Your Own Danger? by WatchGuard Technologies, Inc.

January 2013 - (Free Research)
This resource reveals the major issues plaguing BYOD – from data loss and viruses to policy enforcement and lack of IT insight – and outlines ten strategic points you should include in your BYOD planning process to ensure success. 
(WHITE PAPER) READ ABSTRACT |

HOW TO USE PCI SSC SUPPLEMENT TO ACHIEVE PCI COMPLIANCE IN THE CLOUD by SearchSecurity.com

September 2013 - (Free Research)
This expert guide from SearchSecurity.com examines highlights of the PCI SSC's guidelines to help your business achieve PCI compliance in the cloud. Read on to learn how you can easily secure your applications and your customers' trust. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts